Waraxe IT Security Portal
Login or Register
November 1, 2025
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 124
Members: 0
Total: 124
Full disclosure
SEC Consult SA-20251029-0 :: Unprotected NFC card manipulation leading to free top-up in GiroWeb Cashless Catering Solutions (only legacy customer infrastructure)
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: : "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Dovecot CVE-2025-30189: Auth cache causes access to wrongaccount
SEC Consult SA-20251027-0 :: Unauthenticated Local File Disclosure in MPDV Mikrolab MIP 2 / FEDRA 2 / HYDRA X Manufacturing Execution System #CVE-2025-12055
Stored Cross-Site Scripting (XSS) via SVG File Upload -totaljsv5013
Stored HTML Injection - Layout Functionality - totaljsv5013
Stored Cross-Site Scripting (XSS) - Layout Functionality -totaljsv5013
Current Password not Required When Changing Password -totaljsv5013
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Struts2 and Related Framework Array/Collection DoS
[REVIVE-SA-2025-002] Revive Adserver Vulnerability
[REVIVE-SA-2025-001] Revive Adserver Vulnerability
SEC Consult SA-20251021-0 :: Multiple Vulnerabilities in EfficientLab WorkExaminer Professional (CVE-2025-10639, CVE-2025-10640, CVE-2025-10641)
[SYSS-2025-017]: Verbatim Store 'n' Go Secure Portable HDD (security update v1.0.0.6) - Offline brute-force attack
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 39 matches
What people think about free hosting on Yahoo Geocities
PostForum:Fun corner Posted: Fri Apr 15, 2005 4:28 pm Subject: What people think about free hosting on Yahoo Geocities
ReFleX
Replies: 14
Views: 30581




Here in argentina I have ADSL 256/128 at only 30 USD but yo can have Optic-Fiber Internet 1mb/s at just 50 USD Also you can get 3.5 MBpS but i really dont know the cost. This type of connection are us ...
Hacking phpBB (heres a challenge)
PostForum:Sql injection Posted: Wed Feb 23, 2005 12:20 pm Subject: Hacking phpBB (heres a challenge)
ReFleX
Replies: 6
Views: 17318




Do you tried the phpbb exploit with highlight issue???? you can execute commands.... modify database and even include files. Look at phpbb forum and take a look at vulns in phpbb 2.0.10 The exploit ar ...
Waraxe irc server ?
PostForum:General discussion Posted: Fri Jan 28, 2005 11:04 pm Subject: Waraxe irc server ?
ReFleX
Replies: 2
Views: 12494




yeah the server were down the other day.

I need people who know about irc to help me on the irc channel... send me pv or try to met me in the channel

seeya guys
Astalavista.net proxyDB 1/14/2005
PostForum:Proxy database Posted: Fri Jan 14, 2005 10:22 pm Subject: Astalavista.net proxyDB 1/14/2005
ReFleX
Replies: 4
Views: 31881




thanks argentino!!! very good info!
shadow or .PWD file
PostForum:Newbies corner Posted: Thu Jan 13, 2005 4:51 pm Subject: shadow or .PWD file
ReFleX
Replies: 12
Views: 25828




O.. you really could start from there Laughing Laughing It's the password for FRONT PAGE EXTENSIONS, search a cracker.. i really dont know what programs cracks front page password.
vulns in phpbb 2.0.10
PostForum:PhpBB Posted: Thu Jan 13, 2005 1:37 pm Subject: vulns in phpbb 2.0.10
ReFleX
Replies: 58
Views: 88149




&highlight=%2527.$poster=`cat%20config.php`.%2527

I dont think this could work cos you are only passing the value 'cat%20config.php' to the var $poster ... so to execute commands you HAVE TO us ...
shadow or .PWD file
PostForum:Newbies corner Posted: Thu Jan 13, 2005 11:54 am Subject: shadow or .PWD file
ReFleX
Replies: 12
Views: 25828




could you give more info... like whats the FILENAME and in what directory did you find it???
What about an IRC channel
PostForum:Suggestions Posted: Wed Jan 12, 2005 2:52 pm Subject: What about an IRC channel
ReFleX
Replies: 2
Views: 12197




Hi waraxe!, What about put an IRC Channel for the website so all the users could talk in real time. If you like the idea send me a pm a know a few servers that works great.
shadow or .PWD file
PostForum:Newbies corner Posted: Wed Jan 12, 2005 12:57 pm Subject: shadow or .PWD file
ReFleX
Replies: 12
Views: 25828




ok injector... I think it's a password file BUT to now in what system is encrypted and for what is that password you have to say the name of the file. Is it's a linux password you should try to use Jo ...
simple upload script
PostForum:Remote file inclusion Posted: Wed Jan 12, 2005 12:53 pm Subject: simple upload script
ReFleX
Replies: 4
Views: 15977




Wink Wink ok!! dont be a bad guy hahaha Razz Razz
simple upload script
PostForum:Remote file inclusion Posted: Tue Jan 11, 2005 11:11 pm Subject: simple upload script
ReFleX
Replies: 4
Views: 15977




remember to get out the comment tags.... the var $codigo is all commented.... /* */

Very HappyVery HappyVery Happy Laughing
simple upload script
PostForum:Remote file inclusion Posted: Tue Jan 11, 2005 11:06 pm Subject: simple upload script
ReFleX
Replies: 4
Views: 15977




OK, if you wnat to upload files you can use WGET but remember to put your files in a web server where theres no PHP parser or insted change the extension to .txt use wget to upload it and then use mv ...
great exploit site..
PostForum:Links Posted: Tue Jan 11, 2005 12:23 pm Subject: great exploit site..
ReFleX
Replies: 5
Views: 15321




thanks SteX very good site Very Happy Very Happy Very Happy Wink
vulns in phpbb 2.0.10
PostForum:PhpBB Posted: Tue Jan 11, 2005 12:20 pm Subject: vulns in phpbb 2.0.10
ReFleX
Replies: 58
Views: 88149




very good zer0-c00l, If you want I could help to improve and add some stuff like sql injection, includes, and another things. Send me a private so we talk

seeya guys Laughing Laughing
securityfocus exploit mistake?
PostForum:Sql injection Posted: Mon Jan 10, 2005 11:03 pm Subject: securityfocus exploit mistake?
ReFleX
Replies: 2
Views: 10253




In the 1st one you have to remplace BUG with the BUG %2527.mysql_query(<query>).%2527

but remember that you have to use the function chr For that there are some exploit you can use mine
http ...
Page 1 of 3 Goto page 1, 2, 3Next
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.036 Seconds